article thumbnail

2 Innovations That Can Tip the Balance in Cybersecurity

CIO

Army Major General and Vice President and Federal Chief Security Officer for Palo Alto Networks What critical innovations can change the balance in cybersecurity, providing those of us responsible for defending our organizations with more capabilities against those who would do us harm? This is not just a theoretical exercise.

Security 363
article thumbnail

Log analysis and security firm Graylog raises $9M in equity, $30M in debt

TechCrunch

The decline in VC funding for cybersecurity startups might finally be reversing course after months of discouraging trend lines. Recently, Crunchbase reported that cybersecurity startups raised nearly $1.9 billion through 153 deals in Q3 — a 12% increase from the $1.7 billion raised across 181 deals in the previous quarter.

Analysis 251
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Generative AI & data: Potential in cybersecurity if the risks can be curtailed

CIO

This time they’re making a $13 billion bet by partnering with OpenAI and bringing to market new products like Security Copilot to make sense of the threat landscape using the recently launched text-generating GPT-4 (more on that below). Now, Microsoft is putting a stake in the ground with its generative AI Security Copilot tool.

Security 341
article thumbnail

Cybersecurity e NIS2: come si muovono i CIO per dormire sonni (un po’) più tranquilli

CIO

La cybersecurity toglie il sonno ai CIO? Sicuramente la grande maggioranza dei Chief Information Officer definisce “priorità numero uno” la sicurezza dei sistemi IT aziendali. La cybersecurity è il primo tema per tutte le aziende e, per noi che operiamo nella sanità, lo è ancora di più.

article thumbnail

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

As the end of 2023 approaches, it becomes imperative to assess the current landscape of cybersecurity threats, explore potential strategies to combat them, and explore the new practice measures that can be taken. Our interconnected online world is no longer separate from our lives, businesses, or our global economy.

article thumbnail

Cybersecurity Snapshot: Cyber Agencies Offer Secure AI Tips, while Stanford Issues In-Depth AI Trends Analysis, Including of AI Security

Tenable

Check out recommendations for securing AI systems from the Five Eyes cybersecurity agencies. 1 - Multinational cyber agencies issue best practices for secure AI deployment Looking for best practices on how to securely deploy artificial intelligence (AI) systems? And don’t miss the latest CIS Benchmarks updates.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Today’s technology leaders play a more strategic role in establishing cybersecurity strategy for their organizations. All of these stats beg the question, “Do you know what’s in your software?” Register today! November 14th, 2023 at 9:30am PST, 12:30pm EST, 5:30pm GMT

article thumbnail

The Unexpected Cost of Data Copies

An organization’s data is copied for many reasons, namely ingesting datasets into data warehouses, creating performance-optimized copies, and building BI extracts for analysis. How Dremio delivers clear business advantages in productivity, security, and performance. What to consider when implementing a "no-copy" data strategy.